-
Notifications
You must be signed in to change notification settings - Fork 325
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Net 12039 terminating gateway acl policy fix #4468
base: main
Are you sure you want to change the base?
Conversation
* openshift test * add temporary pr trigger * lint fixes * delete pr trigger * Update acceptance/tests/api-gateway/api_gateway_tenancy_test.go * Update acceptance/framework/consul/helm_cluster.go
… (#4470) * feat: add k8s topology zone info for nodePort service * original PR: #4301 --------- Co-authored-by: kolorful <[email protected]>
…Volumes and extraEnvionmentVars (#4471) * update helm chart to allow for configuring google application credentials * changelog
* Set API gateway security context to comply with best practices * update deployment security context * Set SeccompProfile on injected dataplane sidecar * Drop all capabilities in the injected sidecar * Set required securityContext properties on connect-inject-init container * Add changelog entry * May it please the linter * May it please the linter * Add helpful logs to failure message assertion * Set default value for API gateway's mapPrivilegedContainerPorts * Update invalidated unit tests * May it please the linter * Allow privilege escalation when expected for backwards compatibility * add init sec comp to mesh gateway deployment * Update invalidated unit tests --------- Co-authored-by: Sarah Alsmiller <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some suggestions to align parameter descriptions with the style guide. Otherwise LGTM!
// ConsulPartition indicates the Consul Admin Partition name the controller is | ||
// operating in. Adds this value as metadata on managed resources. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
// ConsulPartition indicates the Consul Admin Partition name the controller is | |
// operating in. Adds this value as metadata on managed resources. | |
// ConsulPartition specifies the name of the Consul admin partition the controller | |
// operates in. Adds this value as metadata on managed resources. |
# A list of extra volumes to mount onto the snapshot agent. This | ||
# is useful for bringing in extra data that only the snapshot agent needs access | ||
# to. Like storage credentials. The value of this should be a list of objects. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
# A list of extra volumes to mount onto the snapshot agent. This | |
# is useful for bringing in extra data that only the snapshot agent needs access | |
# to. Like storage credentials. The value of this should be a list of objects. | |
# A list of extra volumes to mount onto the snapshot agent. Use this block | |
# to include extra data that only the snapshot agent needs access | |
# to, such as storage credentials. This value should be a list of objects. |
# - `type` - Type of the volume, must be one of "configMap" or "secret". Case sensitive. | ||
# | ||
# - `name` - Name of the configMap or secret to be mounted. This also controls | ||
# the path that it is mounted to. The volume will be mounted to `/consul/userconfig/<name>`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
# - `type` - Type of the volume, must be one of "configMap" or "secret". Case sensitive. | |
# | |
# - `name` - Name of the configMap or secret to be mounted. This also controls | |
# the path that it is mounted to. The volume will be mounted to `/consul/userconfig/<name>`. | |
# - `type` - Type of the volume. Must be one of `configMap` or `secret`. Case sensitive. | |
# | |
# - `name` - Name of the configMap or secret to mount. This specification also controls | |
# the path it mounts to. The volume will be mounted to `/consul/userconfig/<name>`. |
# A list of extra environment variables to set on the snapshot agent specifically | ||
# This could be used to configure credentials that the rest of the | ||
# stateful set would not need access to, like GOOGLE_APPLICATION_CREDENTIALS |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
# A list of extra environment variables to set on the snapshot agent specifically | |
# This could be used to configure credentials that the rest of the | |
# stateful set would not need access to, like GOOGLE_APPLICATION_CREDENTIALS | |
# A list of extra environment variables to set on the snapshot agent specifically. | |
# Use this parameter to configure credentials that the rest of the | |
# stateful set would not need access to, like `GOOGLE_APPLICATION_CREDENTIALS`. |
Changes proposed in this PR
global.adminPartitions.enabled: true
Current workflow requires end users to manually update the Terminating Gateway policies applied by the TerminatingGateway resource controller when AdminPartitions are enabled from:
to
How I've tested this PR
make install-dev
to deploy dev image with changesTest Matrix for ACL Policies and Admin Partitions with Terminating Gateway
*
)partition "default" { namespace "default" { service_prefix "" { policy = "write"; intention = "read"; } } }
static-server
)partition "default" { namespace "default" { service "static-server" { policy = "write"; intention = "read"; } } }
*
)partition "dev" { namespace "default" { service_prefix "" { policy = "write"; intention = "read"; } } }
static-server
)partition "dev" { namespace "default" { service "static-server" { policy = "write"; intention = "read"; } } }
*
)namespace "default" { service_prefix "" { policy = "write"; intention = "read"; } }
static-server
)namespace "default" { service "static-server" { policy = "write"; intention = "read"; } }
How I expect reviewers to test this PR
👀
Checklist